Intrusion Detection Systems
Intrusion Detection Systems
1. Introduction … … … … … … … … … … … … … … … …3
2. Security policy … … … … … … … … … … … … … … … 4
3. The Need for Intrusion Detection Systems .… … … … … ... 5
4. Classification of IDS .… … … … … … … … … … … … …7
5. Characterization of IDS … ….… … … … … … … … … …8
5.1 Based on data source .... … … … … … … … … … ..8
5.2 Based on intrusion model … .… … … … … … … …8
5.2.1 Anomaly detection ..… … … … … … …. 9
5.2.2 Misuse detection …… … … … … … … . 10
6. Anomaly Detection Systems … … … …… … … … … … … 11
6.1 Statistical Approaches … … …… … … … … … … .11
6.2 Predictive Pattern Generation ……… … … … … … 12
6.3 Neural Networks … … … … ……… … … … … .... 13
7. Misuse Detection Systems … … … … ……… … … … … …14
7.1 Expert Systems … … … … … … ……… … … … ..14
7.2 Model Based Systems … … … … … … … …… … 15
7.3 Pattern Matching Systems … … … ..… … … … … 15
8. Characteristics of Good IDS … … … … … ….. … … … … 17
9. Conclusion … … … … … … … … … … ……… … … … ..18
10. Bibliography … … … … … … … … … ….. … … … … …19
Introduction
In the last three years, the networking revolution has finally come
of age. More than ever before, we see that the Internet is changing
computing as we know it. The possibilities and opportunities are
limitless; unfortunately, so too are the risks and chances of
malicious intrusions.
• access information,
• manipulate information, or
• render a system unreliable or unusable.
The most popular way to detect intrusions has been by using the
audit data generated by the operating system. An audit trail is a
record of activities on a system that are logged to a file in
chronologically sorted order. Since almost all activities are
logged on a system, it is possible that a manual inspection of
these logs would allow intrusions to be detected. However, the
incredibly large sizes of audit data generated (on the order of 100
Megabytes a day) make manual analysis impossible. IDS
automate the drudgery of wading through the audit data jungle.
Audit trails are particularly useful because they can be used to
establish guilt of attackers, and they are often the only way to
detect unauthorized but subversive user activity.
2. Multihost based:
Audit data from multiple hosts is used to detect intrusions.
3. Network based:
Network traffic data, along with audit data from one or more
hosts, is used to detect intrusions .
Characterization of Intrusion
Detection Systems Based on Model of
Intrusions
1. Anomaly detection model:
This intrusion detection system detects intrusions by looking
for activity that is different from a user's or system's normal
behavior.
Statistical approaches:
Expert systems:
There are some draw backs to the expert system approach too. For
example, the expert system has to be formulated by a security
professional and thus the system is only as strong as the security
personnel who program it. This means that there is a real chance
that expert systems can fail to flag intrusions. It is for this reason
that NIDES has an anomaly as well as a misuse detection
component. These two components are loosely coupled in the
sense that they perform their operations independently for the most
part. The NIDES system runs on a machine different from the
machine(s) to be monitored, which could be unreasonable
overhead. Furthermore, additions and deletions of rules from the
rule-base must take into account the inter-dependencies between
different rules in the rule-base. And there is no recognition of the
sequential ordering of data, because the various conditions that
make up a rule are not recognized to be ordered.
Pattern Matching:
One problem with this model is that, it can only detect attacks
based on known vulnerabilities. In addition, pattern matching is
not very useful for representing ill-defined patterns and it is not an
easy task to translate known attack scenarios into patterns that can
be used by the model. Also, it cannot detect passive wire-tapping
intrusions, nor can in detect spoofing attacks where a machine
pretends to be another machine by using its IP address.
Tomorrow's IDS
http://www.intrusion.com,
http://www.ngc.com,
http://www.csl.sri.com,
http://www.ttisms.com,
http://www.axent.com,
http://www.wheelgroup.com,
http://www.haystck.com,
http://www.iss.net,
http://www.mimestar.com.